10 Steps to Build & Lead a Cybersecurity/CTF Team
Actioning ATT&CK
All the Bacon: How Lesley Knope and Ron Swanson encourage community growth
A Tale of Three Brothers: Three Android Privacy Bugs
Building a Cloud Pentest Lab (and how we blew some up)
Business and the Beast
Cats, Cats, and Moar Katz - Windows Post-Exploitation
Certs vs Degree vs Experience. Which one is the winner?
Closing Ceremony
Comparing Malicious Files
Cryptocurrency as Asymmetric Economic Weapon
CyberSecurity Effectiveness - Do you even security?
Drone Detection
Expanding Our Horizons - The Value of Multidisciplinary Knowledge in Security
“Fast-track your Cybersecurity/Hacking Career – Why Take The Slow Lane?”
Hacking for Good: The Scary State of AppSec
History of E-waste Recycling
How things work: A deep dive into 1Password security
Introduction to Container Security in Kubernetes
Introduction To Ethical Hacking
MAGIC: Malware Analysis to Generate Important Capabilities
My quest for identity in a vendor turmoil
Open Firetalks
Quick Picks from Bro/Zeek logs
Security Lessons Through the Eyes of Harry Potter
Smile You're on Camera! Controversies in Facial Biometrics
So you wanna start a podcast? Experience from starting Iron Sydadmin